Impact
The Team Section Block plugin for WordPress contains a stored cross‑site scripting flaw in all releases up to and including 2.0.0. Unsanitized social network link URLs are stored and later rendered without proper escaping, enabling a contributor or higher logged‑in user to inject arbitrary JavaScript into the page. An attacker can then execute code in the browsers of anyone viewing the affected page, potentially hijacking sessions, defacing content, or delivering phishing content. The weakness is a classic input validation error identified as CWE‑79.
Affected Systems
Any WordPress site that has installed the Team Section Block – Showcase Team Members with Layout Options plugin and is running version 2.0.0 or older. No other products or versions are listed as affected.
Risk and Exploitability
The vulnerability has a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1 %, meaning exploitation is currently considered unlikely. It is not listed in the CISA KEV catalog. Attackers must be authenticated with Contributor level or higher, which is the minimum capability required to edit the block and insert malicious URLs. Once injected, the payload executes for any viewer of the page, giving the attacker the ability to perform a range of malicious actions in the context of the victim site.
OpenCVE Enrichment